336x Filetype PDF File size 0.44 MB Source: www.chironcommercial.com
Visit our online catalog at training.chirontech.com
PYTHON CHIRON METHODOLOGY DOMAIN
CYBER DEVELOPMENT
PROGRAMMING COURSE PROFESSIONAL™ (CDP)™
The Python Programming Course is a concentrated, hands-on DURATION
5 DAYS
course that arms students with the skills and knowledge to leverage
the Python programming language in everyday computer network RECOMMENDED PRE-REQUISITES
operations. Students will start at the beginning with Python, Ä Familiarity with VMware Player
no assumptions are made on prior skill level, and work towards or Workstation
becoming proficient in the language both in reading source Ä Exposure to Linux or UNIX-based
Operating System
code and designing and developing their own applications. The Ä An interest in learning to
course uses real-world techniques within each of the modules, program in Python
demonstrating how Python can be leveraged in each scenario to
help improve success and efficiency. Topics range from creating
your own password cracking tool to setting up client-server
applications, all within 5 days. On the final day of the course,
students will be challenged with a multi-level culmination exercise,
helping to reinforce the skills gained during the week and acquire
new skills as well. This culmination exercise will not only test the
students understanding of the Python language, but will also help
demonstrate the different areas within network operations that
Python can be useful. Students will be required to think creatively to
get through this challenge.
PHONE: 410.672.1552 x 109 FAX: 410.672.3187 ADDRESS 7021 Columbia Gateway Dr. Suite 250 Columbia, MD 21046
© 2016 CHIRON TECHNOLOGY SERVICES, INC.
PYTHON PROGRAMMING COURSE
COURSE SCHEDULE
DAY 1: LEARNING OBJECTIVES OUTLINE
Ä Understand the basics of programming in ³ Orientation & Introductions
any language ³ First Program
Ä Ability to write basic Python scripts ³ Basics of learning a new programming language
independently
Ä Understanding the use of Classes in object- ³ Importing modules
oriented programming ³ Command-line arguments
³ Classes
DAY 2: LEARNING OBJECTIVES OUTLINE
Ä Understanding how to interact with ³ File input ³ String manipulation
files through Python ³ File output ³ Creating a math
Ä Understanding how to interact with the ³ Replicating built-in program
Operating System through Python programs ³ Parsing logfiles
with Python ³ Using the ‘os’
» cap module
» cp ³ Understanding the
» Logfile generator built-in
» grep help systems
» sed ³ Defensive scripts
» ls » Change detection
» find » Killing malware
DAY 3: LEARNING OBJECTIVES OUTLINE
Ä Ability to use Python to perform different ³ Using the ‘crypt’ ³ History of Python
types of password attacks module development
Ä Understanding the history of Python ³ Password attacks vs. ³ Python3
development, including multiple versions /etc/shadow ³ Python for Windows
of Python, and how to port Python code to ³ Time calculations for
other password guessing ³ Programming style
Operating Systems » Why style matters
Ä Understanding the importance of ³ Generating » PEP8 – Python
programming style password lists style guide
³ Manipulating
password lists
© 2016 CHIRON TECHNOLOGY SERVICES, INC.
PYTHON PROGRAMMING COURSE
COURSE SCHEDULE
DAY 4: LEARNING OBJECTIVES OUTLINE
Ä Understanding network programming ³ Building a client socket application
Ä Ability to create custom applications for network » Web client
clients and servers » Custom clients
Ä Ability to apply knowledge from previous lessons to » Password guessing attacks against remote
solving new problems in an exercise servers
³ Building a server socket application
» Using the ‘socket’ module
» Using the ‘SocketServer’ module
» Web server
» SimpleHTTPServer
³ CULEX Part 1
» CTF (Capture The Flag) exercise where
every challenge
must be solved with Python
» In Part 1, the students use Python to
replace-command-line tools in order to
break out of a restricted shell
DAY 5: LEARNING OBJECTIVES OUTLINE
Ä Understanding threaded programming ³ Threaded programming
Ä Ability to generate custom network packets with ³ Network programming with Scapy
Scapy » Overview
Ä Ability to apply knowledge from previous lessons to » Replacing ping
solving new problems in an exercise » Building an ICMP scanner
» Building an ARP scanner
» Sniffing network traffic
» Replicating the TCP 3-way handshake
³ CULEX Part 2
» CTF (Capture The Flag) exercise where
every challenge must be solved with
Python
» In Part 2, the challenges are all network-
based. Students must develop custom
Python applications to interact with remote
servers and solve multiple challenges.
© 2016 CHIRON TECHNOLOGY SERVICES, INC.
no reviews yet
Please Login to review.